Software cracking

Results: 112



#Item
51Tolland /  Connecticut / Fax / Machinist / Image scanner / DSSP / Royal Australian Air Force / Peakhurst /  New South Wales / Technology / Office equipment / CNC Software/Mastercam

Australian Air Force The Royal Australian Air Force (RAAF) operates 71 FA-18s from a number of bases throughout Australia. As part of on-going maintenance, these aircraft are inspected for cracking of structural compone

Add to Reading List

Source URL: www.wysiwyg3d.com.au

Language: English - Date: 2011-02-06 21:45:33
52Port scanner / Nmap / Transmission Control Protocol / Computer network security / Gordon Lyon / Netstat / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Advanced Network  Reconnaissance with Nmap by Fyodor

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:13:13
53Cross-platform software / Nmap / Gordon Lyon / Transmission Control Protocol / Port / Computer network security / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org The New Nmap Gordon “Fyodor” Lyon iSec Open Security Forum – August 21, 2008

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:12:55
54Database management systems / Relational database management systems / Cracking / Oil refining / Database index / Search engine indexing / Software cracking / Extensible Storage Engine / Sorting algorithm / Information science / Computing / Data management

The Uncracked Pieces in Database Cracking Information Systems Group, Saarland University http://infosys.cs.uni-saarland.de ABSTRACT

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-09-10 10:35:34
55Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2014-08-19 09:20:20
56Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni [removed] University of Zagreb, Croatia

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2014-07-23 00:08:16
57Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Computing / Software engineering

Name: Class: Date: Lesson 3: The 5 kingdoms Worksheet: Cracking the classification code

Add to Reading List

Source URL: scienceweb.asta.edu.au

Language: English - Date: 2013-06-24 19:48:29
58Computer security / Mac OS X / Computer law / Crimes / Password cracking / Password / System software / FileVault / Cryptography / Disk encryption / Cryptographic software

Contact: Nataly Koukoushkina Passware Inc. +1 (650) 472­3716 ext. 101 [removed]

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2013-12-17 08:44:18
59Password / Cryptographic software / Identity management systems / Password strength / Password cracking / Security / Computer security / Access control

An Interactive Approach to Secure and Memorable Passwords

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-04-24 13:46:08
60Computer network security / Nmap / Gordon Lyon / Transmission Control Protocol / Ping / Firewall / Stateful firewall / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA – August 6, 2008; 10AM

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:15:31
UPDATE